![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 33 matches
- 2010
- Hanan A. R. Akkar:
Optimizing Opto-Electronic Cellular Neural Networks Using Bees Swarm Intelligent. Int. J. Inf. Process. Manag. 1(1): 114-125 (2010) - Seena Biju, Sreekumaran Nair:
Multilevel Modeling: A review of the model, its features and the applications in decision making. Int. J. Inf. Process. Manag. 1(2): 50-57 (2010) - Milad Daliran, Ramin Nassiri:
Increase honeypot security through data analysis. Int. J. Inf. Process. Manag. 1(2): 34-39 (2010) - Mohamed Elhadi, Amjad Al-Tobi:
Detection of Duplication in Documents and WebPages Based Documents Syntactical Structures through an Improved Longest Common Subsequence. Int. J. Inf. Process. Manag. 1(1): 138-147 (2010) - Rune Møllegaard Friborg, Brian Vinter, John Markus Bjørndalen:
PyCSP - controlled concurrency. Int. J. Inf. Process. Manag. 1(2): 40-49 (2010) - Jung-Hong Hong, Hsiung-Peng Liao:
Interoperable map interface towards the data quality of internet geospatial resource: a metadata perspective. Int. J. Inf. Process. Manag. 1(1): 42-54 (2010) - Shu-Hua Hsiao, Pei-Wen Wang, Chaochang Chiu, G-Lun Chung, Ke-Chung Peng, Meng-Long Shih:
A study of Linkage Analysis on The Cultural and Creative Industries. Int. J. Inf. Process. Manag. 1(2): 133-139 (2010) - Qitu Hu, Xiaoling Zhang, Xiao Deng:
Development and Research of the Integration between Information Technology and Physics Course. Int. J. Inf. Process. Manag. 1(2): 30-33 (2010) - Toshiyuki Ishimura, Akinori Kanasugi:
A Design and Simulation for Dynamically Reconfigurable Systolic Array. Int. J. Inf. Process. Manag. 1(2): 18-24 (2010) - Dost Muhammad Khan, Nawaz Mohamudally:
An Agent Oriented Approach for Implementation of the Range Method of Initial Centroids in K-Means Clustering Data Mining Algorithm. Int. J. Inf. Process. Manag. 1(1): 104-113 (2010) - Gia Kim, Siu Man Lui:
The Impacts of Blink on Graphical Information Processing. Int. J. Inf. Process. Manag. 1(2): 124-132 (2010) - ChangKug Kim, Dong-Suk Park, Young-Joo Seol, SooChul Park, JangHo Hahn:
An Integrated Genome Database for Agricultural Crops and Web Service. Int. J. Inf. Process. Manag. 1(2): 25-29 (2010) - S. Britto R. Kumar, S. Albert Rabara:
MPCS: Secure Account-based Mobile Payment System. Int. J. Inf. Process. Manag. 1(1): 59-69 (2010) - Yuhong Li, Zhongwen Chen, Lanping Yan, Shuixiang Luo:
Research on the Relationship between Foreign Trade and GDP Growth in West China - Empirical Analysis Based on Panel Causality. Int. J. Inf. Process. Manag. 1(2): 84-93 (2010) - Shengdong Li, Xueqiang Lv, Yuqin Li, Shuicai Shi:
Study on Feature Selection Algorithm in Topic Tracking. Int. J. Inf. Process. Manag. 1(1): 25-33 (2010) - Te-Hsin Liang, Jia-Ling Peng, Yi-Ying Chi:
The Awareness and Want Matrix Analysis of Ubiquitous e-Services in Taiwan. Int. J. Inf. Process. Manag. 1(2): 94-102 (2010) - Ling-yan Lin, Jian-cheng Song, Mu-Qin Tian:
The Early Fault Diagnosis Method of Induce Motor Based on Gray Prediction Nerve Network. Int. J. Inf. Process. Manag. 1(1): 100-103 (2010) - Zhiming Liu, Yaping Wan, Jichang Sha, Xiaohua Yang:
A Peer-to-Peer System Super Node Election Mechanism. Int. J. Inf. Process. Manag. 1(2): 58-67 (2010) - Rattiporn Luanrattana:
A Case Study of the Deployment of PDA Accessible Clinical-Log for Medical Education in PBL-Approach. Int. J. Inf. Process. Manag. 1(1): 77-85 (2010) - Ahmed M. Mahdy, Dan Li:
A Hybrid Route Prediction Algorithm for Efficient QoS Support in Wireless Cellular Networks. Int. J. Inf. Process. Manag. 1(2): 115-123 (2010) - Brenda L. Mak, Hy Sockel, Judie A. Bucholz, Miriam W. Webb:
Technostress and Organization Loyalty of IS&T Workers - A Path Model. Int. J. Inf. Process. Manag. 1(2): 4-17 (2010) - Natarajan Meghanathan:
A Simulation-based Performance Analysis of Multicast Routing in Mobile Ad hoc Networks. Int. J. Inf. Process. Manag. 1(1): 4-14 (2010) - Tian Mu-Qin, Lan Yu-fei:
Research on Intelligent Diagnosis for Early Faults in Three-phase equipment. Int. J. Inf. Process. Manag. 1(1): 86-90 (2010) - Hiroshi Ohtaka, Koichiro Oshika, Masashi Gotou, Tsutomu Yoshitani, Yoshiaki Fukazawa:
A Model for Manageable Dependability of IT Services Associated with Social and Economic Infrastructure. Int. J. Inf. Process. Manag. 1(1): 15-24 (2010) - Jantima Polpinij, Chumsak Sibunruang:
Thai E-san Heritage Images Classification based on Color Features Analysis: The Normalized R/G Ratio and Edge Histograms. Int. J. Inf. Process. Manag. 1(1): 34-41 (2010) - Conrado R. Ruiz Jr., Sujitra Chodnok, Nor Hidayu Salimi, Pham Trung Ha:
Computer Games: A New Medium for Traditional Asian Art. Int. J. Inf. Process. Manag. 1(1): 91-99 (2010) - Byounghee Son, Youngchoong Park:
An Auto-configuration Method and a Hierarchical Treelike Data Structure for a Home Server. Int. J. Inf. Process. Manag. 1(2): 74-84 (2010) - Weifeng Sun, Juanyun Wang, Boxiang Dong, Mingchu Li, Zhenquan Qin:
A Mediated RSA-based End Entity Certificates Revocation Mechanism with Secure Concerned in Grid. Int. J. Inf. Process. Manag. 1(2): 103-114 (2010) - Mu-ling Tian, Jie-ming Yang:
Selection of De-noising Methods of Signals in Fault Diagnosis of Motor. Int. J. Inf. Process. Manag. 1(1): 55-58 (2010) - Lei Wang, Ruishan Sun:
Culture Influences on Implementation of HILAS Systems. Int. J. Inf. Process. Manag. 1(2): 140-148 (2010)
skipping 3 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-28 00:54 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint